Offense. Defense. Resilience.

Team 1940 Cyber Security & CTF

We sharpen our skills through real challenge infrastructure, live scoring, and focused practice built around modern cyber threats.

Users

6

Challenges

1

Attempts

6

Correct Solves

4

Leaderboard Preview

View all

#1 moon

admin

30

#2 sh5b

admin

30

#3 ROOT

user

30

#4 wahd

user

30

#5 ghost543753

user

0

Recent Submissions

wahd · just base64 !!!

CTF Challenges · Crypto

Correct · 5/7/2026, 7:59:16 AM

wahd · just base64 !!!

CTF Challenges · Crypto

Incorrect · 5/7/2026, 7:58:41 AM

moon · first challenge

تحديات فريق 1940 · Crypto

Correct · 5/4/2026, 7:50:35 PM

ROOT · just base64 !!!

CTF Challenges · Crypto

Correct · 5/4/2026, 7:31:42 PM

sh5b · just base64 !!!

CTF Challenges · Crypto

Correct · 5/4/2026, 7:10:27 PM

moon · just base64 !!!

CTF Challenges · Crypto

Correct · 5/4/2026, 7:06:58 PM

About 1940

Team 1940 builds practical cyber capability, not theory alone

We operate like a live offensive and defensive lab: analysis, repetition, and delivery inside practical cyber environments.

We are Team 1940, a cybersecurity-focused team specialized in modern technologies. We work on developing our skills and building smart solutions that simulate real-world threats. We believe that true learning comes from experience, so we focus on practical training and technical challenges.

Operational Domains

What Team 1940 actively trains

Our training lanes cover offensive research, defensive response, and deep technical analysis across modern surfaces.

01 /web

Web

Exploit routing flaws, auth mistakes, SSRF paths, and broken access controls.

02 /pwn

Pwn

Attack native binaries, memory corruption bugs, and hardened targets.

03 /crypto

Crypto

Break weak ciphers, flawed protocols, and implementation shortcuts.

04 /forensics

Forensics

Recover evidence, trace attacker activity, and extract hidden artifacts.

05 /reverse

Reverse

Dissect binaries and scripts to recover logic, secrets, and bypass paths.

06 /ai-security

AI Security

Test prompt injection, unsafe tooling, and model-driven attack surfaces.

07 /network-security

Network Security

Analyze traffic, protocols, segmentation, and network-level attack paths.

Browse the challenge board

Team Members

The people operating the 1940 grid

Add team members from the admin panel to populate this section with real CV cards.

Quick access

Move quickly through the 1940 platform

01

Join The Grid

Create an operator account, authenticate through a hardened session flow, and enter the training stack.

02

Break Systems

Work through live tasks, validate hypotheses, and map your offensive and defensive range.

03

Climb The Board

Each accepted solve updates scoring in real time and pushes your position higher.